Target Threat Assessment Based on Intuitionistic Fuzzy Sets Choquet Integral

Article Preview

Abstract:

For the problem that threat assessment often has some uncertainty and the correlation exist among threat factors, a technique based on intuitionistic fuzzy sets Choquet integral is proposed with intuitionistic fuzzy sets and fuzzy integral being introduced into information fusion area. First, threat estimators based on different factors are constructed with intuitionistic fuzzy sets theory. The uncertainty of each estimator is represented with membership function and non-membership function. Then, the significances of the estimators are modeled with fuzzy measures. Subsequently, threat assessment results are obtained using Choquet integral. Finally, the proposed method is validated through the air combat threat assessment of 20 typical targets.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

736-743

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] WANG, X.Z. Fuzzy Measure, Fuzzy Integral, and Their Application in Classification Technique [M]. Beijing: Science Press, 2008. (in Chinese).

Google Scholar

[2] KE, H.F., CHEN, Y.G. Threat assessment model for the jamming target of electronic warfare based on multiple attribute and multiple hierarchy [J]. Systems Engineering and Electronics, 2006, 28(9): 1370-1374. (in Chinese).

Google Scholar

[3] WANG, X.Y., LIU, Z.W., HOU, C.Z., ZHANG, C., YUAN, J.M. Method of object threat assessment based on fuzzy MADM [J]. Control and Decision, 2007, 22(8): 859-863. (in Chinese).

Google Scholar

[4] CAO, K.J. Study on Multi-source Information-based Attribute Fusion and Threat Assessment Technique [D]. Nanjing: PLA University of Science and Technology, 2006. (in Chinese).

Google Scholar

[5] WANG, X.H., QIN, Z., LIU, Y., SHI, Z.W. RBF Neural Network for Threat Sequencing [J]. Journal of System Simulation, 2004, 16(7): 1576- 1579. (in Chinese).

Google Scholar

[6] LEI, Y.J., WANG, B.S., LU, Y.L. Techniques for Threat Assessment Based on Adaptive Intuitionistic Fuzzy Reasoning [J]. Journal of Electronics & Information Technology, 2007, 29(12): 2805-2809. (in Chinese).

Google Scholar

[7] LEI, Y.J., WANG, B.S., WANG, Y. Techniques for Threat Assessment Based on Intuitionistic Fuzzy Reasoning [J]. Journal of Electronics & Information Technology, 2007, 29(9): 2077-2081. (in Chinese).

Google Scholar

[8] HUANG, J., LI, B.C., ZHAO, Y.J. Target Threat Assessment Based on Choquet integral [J]. Journal of Information Engineering University, 2012, 13(1): 18-21. (in Chinese).

Google Scholar

[9] ZHAO, L., LIU, Z.M., JIANG, C.S. Research on Confrontation Strategy Algorithm of Terminal Defense System [J]. Journal of Astronautics, 2011, 32(3): 574-581. (in Chinese).

Google Scholar

[10] CHEN, H., ZHANG, K., CAO, J.S. Target threat assessment based on PSO-BP algorithm [J]. Application Research of Computers, 2012, 29(3), 900-901. (in Chinese).

Google Scholar

[11] Wang Yi, Sun Yuan, Li Ji-ying. Air Defense Threat Assessment Based on Dynamic Bayesian Network[C]. 2012 International Conference on Systems and Informatics, Yantai, 2012: 721-724.

DOI: 10.1109/icsai.2012.6223112

Google Scholar

[12] MA, S.D., HAN,L., GONG,G.H., SONG, X. Target threat assessment technology based on cloud model [J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(2): 150-153. (in Chinese).

Google Scholar